Open in app

Sign in

Medium Logo
Write

Sign in

Shubham Tiwari
Shubham Tiwari

564 followers

Home

Lists

About

Pinned

Deep-Subdomains-Enumeration-Methodology

Mastering the art of subdomain enumeration is a crucial skill for those seeking to unlock the full potential of web architecture. By…

Jun 13, 2023
4
Jun 13, 2023
4

Ultimate CVE Hunter Tool: A Comprehensive Guide

Cybersecurity professionals and enthusiasts often face the challenge of identifying vulnerabilities within networks or systems. The…

Jan 16
Ultimate CVE Hunter Tool: A Comprehensive Guide
Ultimate CVE Hunter Tool: A Comprehensive Guide
Jan 16

🚀 Introducing ShodanSpider v2: Your Ultimate Free Tool for CVE Searching and Shodan Data Analysis…

In today’s fast-paced cybersecurity world, staying ahead of vulnerabilities is critical. ShodanSpider v2 takes your security research to…

Dec 13, 2024
5
🚀 Introducing ShodanSpider v2: Your Ultimate Free Tool for CVE Searching and Shodan Data Analysis…
🚀 Introducing ShodanSpider v2: Your Ultimate Free Tool for CVE Searching and Shodan Data Analysis…
Dec 13, 2024
5

ShodanSpider: A Powerful Tool for Cybersecurity Research

In the ever-evolving world of cybersecurity, having the right tools can make all the difference. ShodanSpider is a powerful, user-friendly…

Nov 22, 2024
3
Nov 22, 2024
3

Automating Subdomain Enumeration to Discover Critical Vulnerabilities

Hello, I’m Shubham Tiwari, commonly known as Rooter in the cybersecurity space. Today, I’m going to share how I identified a critical…

Sep 15, 2024
3
Automating Subdomain Enumeration to Discover Critical Vulnerabilities
Automating Subdomain Enumeration to Discover Critical Vulnerabilities
Sep 15, 2024
3

XSS Automation Finding with Rooter

I’m Shubham Tiwari, and I’ve been actively involved in bug bounty hunting for quite some time. In my journey, I’ve inspired myself to…

Apr 8, 2024
2
XSS Automation Finding with Rooter
XSS Automation Finding with Rooter
Apr 8, 2024
2

Critical Vulnerability in PostgreSQL JDBC Driver — Understanding CVE-2024–1597

Hey there, fellow cybersecurity enthusiasts!

Mar 21, 2024
Mar 21, 2024

Best Recon methodology (Shubham Rooter)

What is recon?

Feb 1, 2024
2
Best Recon methodology (Shubham Rooter)
Best Recon methodology (Shubham Rooter)
Feb 1, 2024
2

Wifi Soft Unibox Administration 3.0 Login Page Exploit

Introduction

Sep 8, 2023
Wifi Soft Unibox Administration 3.0 Login Page Exploit
Wifi Soft Unibox Administration 3.0 Login Page Exploit
Sep 8, 2023

Mastering Bug Bounty Hunting: A Comprehensive Methodology by Shubham Tiwari

Introduction: In the realm of cybersecurity, bug bounty hunting has evolved into a dynamic and rewarding pursuit. Join me, Shubham Tiwari…

Aug 26, 2023
1
Aug 26, 2023
1
Shubham Tiwari

Shubham Tiwari

564 followers
Following
  • AbhirupKonwar

    AbhirupKonwar

  • Ott3rly

    Ott3rly

  • Thexssrat

    Thexssrat

  • Armaan Pathan

    Armaan Pathan

  • Orwa Atyat

    Orwa Atyat

See all (5)

Help

Status

About

Careers

Press

Blog

Privacy

Rules

Terms

Text to speech